Trajectory privacy protection scheme based on differential privacy
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN +3 more
doaj +3 more sources
Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties [PDF]
Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points ...
Kaplan, Emre +5 more
core +3 more sources
Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU +4 more
doaj +3 more sources
Real-world trajectory sharing with local differential privacy [PDF]
Sharing trajectories is beneficial for many real-world applications, such as managing disease spread through contact tracing and tailoring public services to a population's travel patterns. However, public concern over privacy and data protection has limited the extent to which this data is shared.
Cunningham, Teddy +3 more
openaire +3 more sources
Preserving Trajectory Privacy in Driving Data Release
Real-time data transmissions from a vehicle enhance road safety and traffic efficiency by aggregating data in a central server for data analytics. When drivers share their instantaneous vehicular information for a service provider to perform a legitimate task, a curious service provider may also infer private information it has not been authorized for.
Xu, Yi +3 more
openaire +2 more sources
Risk-Aware Individual Trajectory Data Publishing With Differential Privacy
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao +4 more
doaj +1 more source
Discovering private trajectories using background information [PDF]
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques.
Kaplan, Emre +5 more
core +2 more sources
Differential privacy protection method based on published trajectory cross-correlation constraint.
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj +1 more source
Multi-camera trajectory forecasting : pedestrian trajectory prediction in a network of cameras [PDF]
We introduce the task of multi-camera trajectory forecasting (MCTF), where the future trajectory of an object is predicted in a network of cameras. Prior works consider forecasting trajectories in a single camera view.
Guha, Tanaya +3 more
core +2 more sources
Privacy Preservation in the Publication of Trajectories [PDF]
We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (by only hiding the identities of persons that followed them ...
Mamoulis, N, Terrovitis, M
openaire +2 more sources

